897 resultados para Flip and Saddle-node Bifurcation
Resumo:
Polycomb-like proteins 1-3 (PCL1-3) are substoichiometric components of the Polycomb-repressive complex 2 (PRC2) that are essential for association of the complex with chromatin. However, it remains unclear why three proteins with such apparent functional redundancy exist in mammals. Here we characterize their divergent roles in both positively and negatively regulating cellular proliferation. We show that while PCL2 and PCL3 are E2F-regulated genes expressed in proliferating cells, PCL1 is a p53 target gene predominantly expressed in quiescent cells. Ectopic expression of any PCL protein recruits PRC2 to repress the INK4A gene; however, only PCL2 and PCL3 confer an INK4A-dependent proliferative advantage. Remarkably, PCL1 has evolved a PRC2- and chromatin-independent function to negatively regulate proliferation. We show that PCL1 binds to and stabilizes p53 to induce cellular quiescence. Moreover, depletion of PCL1 phenocopies the defects in maintaining cellular quiescence associated with p53 loss. This newly evolved function is achieved by the binding of the PCL1 N-terminal PHD domain to the C-terminal domain of p53 through two unique serine residues, which were acquired during recent vertebrate evolution. This study illustrates the functional bifurcation of PCL proteins, which act in both a chromatin-dependent and a chromatin-independent manner to regulate the INK4A and p53 pathways.
Resumo:
Importance: The natural history of patients with newly diagnosed high-risk nonmetastatic (M0) prostate cancer receiving hormone therapy (HT) either alone or with standard-of-care radiotherapy (RT) is not well documented. Furthermore, no clinical trial has assessed the role of RT in patients with node-positive (N+) M0 disease. The STAMPEDE Trial includes such individuals, allowing an exploratory multivariate analysis of the impact of radical RT.
Objective: To describe survival and the impact on failure-free survival of RT by nodal involvement in these patients.
Design, Setting, and Participants: Cohort study using data collected for patients allocated to the control arm (standard-of-care only) of the STAMPEDE Trial between October 5, 2005, and May 1, 2014. Outcomes are presented as hazard ratios (HRs) with 95% CIs derived from adjusted Cox models; survival estimates are reported at 2 and 5 years. Participants were high-risk, hormone-naive patients with newly diagnosed M0 prostate cancer starting long-term HT for the first time. Radiotherapy is encouraged in this group, but mandated for patients with node-negative (N0) M0 disease only since November 2011.
Exposures: Long-term HT either alone or with RT, as per local standard. Planned RT use was recorded at entry.
Main Outcomes and Measures: Failure-free survival (FFS) and overall survival.
Results: A total of 721 men with newly diagnosed M0 disease were included: median age at entry, 66 (interquartile range [IQR], 61-72) years, median (IQR) prostate-specific antigen level of 43 (18-88) ng/mL. There were 40 deaths (31 owing to prostate cancer) with 17 months' median follow-up. Two-year survival was 96% (95% CI, 93%-97%) and 2-year FFS, 77% (95% CI, 73%-81%). Median (IQR) FFS was 63 (26 to not reached) months. Time to FFS was worse in patients with N+ disease (HR, 2.02 [95% CI, 1.46-2.81]) than in those with N0 disease. Failure-free survival outcomes favored planned use of RT for patients with both N0M0 (HR, 0.33 [95% CI, 0.18-0.61]) and N+M0 disease (HR, 0.48 [95% CI, 0.29-0.79]).
Conclusions and Relevance: Survival for men entering the cohort with high-risk M0 disease was higher than anticipated at study inception. These nonrandomized data were consistent with previous trials that support routine use of RT with HT in patients with N0M0 disease. Additionally, the data suggest that the benefits of RT extend to men with N+M0 disease.
Trial Registration: clinicaltrials.gov Identifier: NCT00268476; ISRCTN78818544.
Resumo:
We make a case for studying the impact of intra-node parallelism on the performance of data analytics. We identify four performance optimizations that are enabled by an increasing number of processing cores on a chip. We discuss the performance impact of these opimizations on two analytics operators and we identify how these optimizations affect each another.
Resumo:
Cloud data centres are implemented as large-scale clusters with demanding requirements for service performance, availability and cost of operation. As a result of scale and complexity, data centres typically exhibit large numbers of system anomalies resulting from operator error, resource over/under provisioning, hardware or software failures and security issus anomalies are inherently difficult to identify and resolve promptly via human inspection. Therefore, it is vital in a cloud system to have automatic system monitoring that detects potential anomalies and identifies their source. In this paper we present a lightweight anomaly detection tool for Cloud data centres which combines extended log analysis and rigorous correlation of system metrics, implemented by an efficient correlation algorithm which does not require training or complex infrastructure set up. The LADT algorithm is based on the premise that there is a strong correlation between node level and VM level metrics in a cloud system. This correlation will drop significantly in the event of any performance anomaly at the node-level and a continuous drop in the correlation can indicate the presence of a true anomaly in the node. The log analysis of LADT assists in determining whether the correlation drop could be caused by naturally occurring cloud management activity such as VM migration, creation, suspension, termination or resizing. In this way, any potential anomaly alerts are reasoned about to prevent false positives that could be caused by the cloud operator’s activity. We demonstrate LADT with log analysis in a Cloud environment to show how the log analysis is combined with the correlation of systems metrics to achieve accurate anomaly detection.
Resumo:
Os sistemas distribuídos embarcados (Distributed Embedded Systems – DES) têm sido usados ao longo dos últimos anos em muitos domínios de aplicação, da robótica, ao controlo de processos industriais passando pela aviónica e pelas aplicações veiculares, esperando-se que esta tendência continue nos próximos anos. A confiança no funcionamento é uma propriedade importante nestes domínios de aplicação, visto que os serviços têm de ser executados em tempo útil e de forma previsível, caso contrário, podem ocorrer danos económicos ou a vida de seres humanos poderá ser posta em causa. Na fase de projecto destes sistemas é impossível prever todos os cenários de falhas devido ao não determinismo do ambiente envolvente, sendo necessária a inclusão de mecanismos de tolerância a falhas. Adicionalmente, algumas destas aplicações requerem muita largura de banda, que também poderá ser usada para a evolução dos sistemas, adicionandolhes novas funcionalidades. A flexibilidade de um sistema é uma propriedade importante, pois permite a sua adaptação às condições e requisitos envolventes, contribuindo também para a simplicidade de manutenção e reparação. Adicionalmente, nos sistemas embarcados, a flexibilidade também é importante por potenciar uma melhor utilização dos, muitas vezes escassos, recursos existentes. Uma forma evidente de aumentar a largura de banda e a tolerância a falhas dos sistemas embarcados distribuídos é a replicação dos barramentos do sistema. Algumas soluções existentes, quer comerciais quer académicas, propõem a replicação dos barramentos para aumento da largura de banda ou para aumento da tolerância a falhas. No entanto e quase invariavelmente, o propósito é apenas um, sendo raras as soluções que disponibilizam uma maior largura de banda e um aumento da tolerância a falhas. Um destes raros exemplos é o FlexRay, com a limitação de apenas ser permitido o uso de dois barramentos. Esta tese apresentada e discute uma proposta para usar a replicação de barramentos de uma forma flexível com o objectivo duplo de aumentar a largura de banda e a tolerância a falhas. A flexibilidade dos protocolos propostos também permite a gestão dinâmica da topologia da rede, sendo o número de barramentos apenas limitado pelo hardware/software. As propostas desta tese foram validadas recorrendo ao barramento de campo CAN – Controller Area Network, escolhido devido à sua grande implantação no mercado. Mais especificamente, as soluções propostas foram implementadas e validadas usando um paradigma que combina flexibilidade com comunicações event-triggered e time-triggered: o FTT – Flexible Time- Triggered. No entanto, uma generalização para CAN nativo é também apresentada e discutida. A inclusão de mecanismos de replicação do barramento impõe a alteração dos antigos protocolos de replicação e substituição do nó mestre, bem como a definição de novos protocolos para esta finalidade. Este trabalho tira partido da arquitectura centralizada e da replicação do nó mestre para suportar de forma eficiente e flexível a replicação de barramentos. Em caso de ocorrência de uma falta num barramento (ou barramentos) que poderia provocar uma falha no sistema, os protocolos e componentes propostos nesta tese fazem com que o sistema reaja, mudando para um modo de funcionamento degradado. As mensagens que estavam a ser transmitidas nos barramentos onde ocorreu a falta são reencaminhadas para os outros barramentos. A replicação do nó mestre baseia-se numa estratégia líder-seguidores (leaderfollowers), onde o líder (leader) controla todo o sistema enquanto os seguidores (followers) servem como nós de reserva. Se um erro ocorrer no nó líder, um dos nós seguidores passará a controlar o sistema de uma forma transparente e mantendo as mesmas funcionalidades. As propostas desta tese foram também generalizadas para CAN nativo, tendo sido para tal propostos dois componentes adicionais. É, desta forma possível ter as mesmas capacidades de tolerância a falhas ao nível dos barramentos juntamente com a gestão dinâmica da topologia de rede. Todas as propostas desta tese foram implementadas e avaliadas. Uma implementação inicial, apenas com um barramento foi avaliada recorrendo a uma aplicação real, uma equipa de futebol robótico onde o protocolo FTT-CAN foi usado no controlo de movimento e da odometria. A avaliação do sistema com múltiplos barramentos foi feita numa plataforma de teste em laboratório. Para tal foi desenvolvido um sistema de injecção de faltas que permite impor faltas nos barramentos e nos nós mestre, e um sistema de medida de atrasos destinado a medir o tempo de resposta após a ocorrência de uma falta.
Resumo:
In recent years, a new paradigm for communication called cooperative communications has been proposed for which initial information theoretic studies have shown the potential for improvements in capacity over traditional multi-hop wireless networks. Extensive research has been done to mitigate the impact of fading in wireless networks, being mostly focused on Multiple-Input Multiple-Output (MIMO) systems. Recently, cooperative relaying techniques have been investigated to increase the performance of wireless systems by using diversity created by different single antenna devices, aiming to reach the same level of performance of MIMO systems with low cost devices. Cooperative communication is a promising method to achieve high spectrum efficiency and improve transmission capacity for wireless networks. Cooperative communications is the general idea of pooling the resources of distributed nodes to improve the overall performance of a wireless network. In cooperative networks the nodes cooperate to help each other. A cooperative node offering help is acting like a middle man or proxy and can convey messages from source to destination. Cooperative communication involves exploiting the broadcast nature of the wireless medium to form virtual antenna arrays out of independent singleantenna network nodes for transmission. This research aims at contributing to the field of cooperative wireless networks. The focus of this research is on the relay-based Medium Access Control (MAC) protocol. Specifically, I provide a framework for cooperative relaying called RelaySpot which comprises on opportunistic relay selection, cooperative relay scheduling and relay switching. RelaySpot-based solutions are expected to minimize signaling exchange, remove estimation of channel conditions, and improve the utilization of spatial diversity, minimizing outage and increasing reliability.
Resumo:
The promise of a truly mobile experience is to have the freedom to roam around anywhere and not be bound to a single location. However, the energy required to keep mobile devices connected to the network over extended periods of time quickly dissipates. In fact, energy is a critical resource in the design of wireless networks since wireless devices are usually powered by batteries. Furthermore, multi-standard mobile devices are allowing users to enjoy higher data rates with ubiquitous connectivity. However, the bene ts gained from multiple interfaces come at a cost in terms of energy consumption having profound e ect on the mobile battery lifetime and standby time. This concern is rea rmed by the fact that battery lifetime is one of the top reasons why consumers are deterred from using advanced multimedia services on their mobile on a frequent basis. In order to secure market penetration for next generation services energy e ciency needs to be placed at the forefront of system design. However, despite recent e orts, energy compliant features in legacy technologies are still in its infancy, and new disruptive architectures coupled with interdisciplinary design approaches are required in order to not only promote the energy gain within a single protocol layer, but to enhance the energy gain from a holistic perspective. A promising approach is cooperative smart systems, that in addition to exploiting context information, are entities that are able to form a coalition and cooperate in order to achieve a common goal. Migrating from this baseline, this thesis investigates how these technology paradigm can be applied towards reducing the energy consumption in mobile networks. In addition, we introduce an additional energy saving dimension by adopting an interlayer design so that protocol layers are designed to work in synergy with the host system, rather than independently, for harnessing energy. In this work, we exploit context information, cooperation and inter-layer design for developing new energy e cient and technology agnostic building blocks for mobile networks. These technology enablers include energy e cient node discovery and short-range cooperation for energy saving in mobile handsets, complemented by energy-aware smart scheduling for promoting energy saving on the network side. Analytical and simulations results were obtained, and veri ed in the lab on a real hardware testbed. Results have shown that up to 50% energy saving could be obtained.
Resumo:
In Mobile Ad hoc NETworks (MANETs), where cooperative behaviour is mandatory, there is a high probability for some nodes to become overloaded with packet forwarding operations in order to support neighbor data exchange. This altruistic behaviour leads to an unbalanced load in the network in terms of traffic and energy consumption. In such scenarios, mobile nodes can benefit from the use of energy efficient and traffic fitting routing protocol that better suits the limited battery capacity and throughput limitation of the network. This PhD work focuses on proposing energy efficient and load balanced routing protocols for ad hoc networks. Where most of the existing routing protocols simply consider the path length metric when choosing the best route between a source and a destination node, in our proposed mechanism, nodes are able to find several routes for each pair of source and destination nodes and select the best route according to energy and traffic parameters, effectively extending the lifespan of the network. Our results show that by applying this novel mechanism, current flat ad hoc routing protocols can achieve higher energy efficiency and load balancing. Also, due to the broadcast nature of the wireless channels in ad hoc networks, other technique such as Network Coding (NC) looks promising for energy efficiency. NC can reduce the number of transmissions, number of re-transmissions, and increase the data transfer rate that directly translates to energy efficiency. However, due to the need to access foreign nodes for coding and forwarding packets, NC needs a mitigation technique against unauthorized accesses and packet corruption. Therefore, we proposed different mechanisms for handling these security attacks by, in particular by serially concatenating codes to support reliability in ad hoc network. As a solution to this problem, we explored a new security framework that proposes an additional degree of protection against eavesdropping attackers based on using concatenated encoding. Therefore, malicious intermediate nodes will find it computationally intractable to decode the transitive packets. We also adopted another code that uses Luby Transform (LT) as a pre-coding code for NC. Primarily being designed for security applications, this code enables the sink nodes to recover corrupted packets even in the presence of byzantine attacks.
Resumo:
Cardiogenesis is a delicate and complex process that requires the coordination of an intricate network of pathways and the different cell types. Therefore, understanding heart development at the morphogenetic level is an essential requirement to uncover the causes of congenital heart disease and to provide insight for disease therapies. Mouse Cerberus like 2 (Cerl2) has been defined as a Nodal antagonist in the node with an important role in the Left-Right (L/R) axis establishment, at the early embryonic development. As expected, Cerl2 knockout mice (Cerl2-/-) showed multiple laterality defects with associated cardiac failure. In order to identify the endogenous role of Cerl2 during heart formation independent of its described functions in the node, we accurately analyzed animals where laterality defects were not present. We thereby unravel the consequences of Cerl2 lossof- function in the heart, namely increased left ventricular thickness due to hyperplasia of cardiomyocytes and de-regulated expression of cardiac genes. Furthermore, the Cerl2 mutant neonates present impaired cardiac function. Once that the cardiac expression of Cerl2 is mostly observed in the left ventricle until around midgestration, this result suggest a specific regulatory role of Cerl2 during the formation of the left ventricular myoarchitecture. Here, we present two possible molecular mechanisms underlying the cardiac Cerl2 function, the regulation of Cerl2 antagonist in activation of the TGFßs/Nodal/Activin/Smad2 signaling identified by increased Smad2 phosphorilation in Cerl2-/- hearts and the negative feedback between Cerl2 and Wnt/ß-catenin signaling in heart formation. In this work and since embryonic stem cells derived from 129 mice strain is extensively used to produce targeted mutants, we also present echocardiographic reference values to progressive use of juveniles and young adult 129/Sv strain in cardiac studies. In addition, we investigate the cardiac physiology of the surviving Cerl2 mutants in 129/Sv background over time through a follow-up study using echocardiographic analysis. Our results revealed that Cerl2-/- mice are able to improve and maintain the diastolic and most of systolic cardiac physiologic parameters as analyzed until young adult age. Since Cerl2 is no longer expressed in the postnatal heart, we suggest that an intrinsic and compensatory mechanism of adaptation may be active for recovering the decreased cardiac function found in Cerl2 mutant neonates. Altogether, these data highlight the role of Cerl2 during embryonic heart development in mice. Furthermore, we also suggest that Cerl2-/- may be an interesting model to uncover the molecular, cellular and physiological mechanisms behind the improvement of the cardiac function, contributing to the development of therapeutic approaches to treat heart failures.
Resumo:
Neuroimaging studies of aesthetic appreciation have shown that activity in the lateral occipital area (LO)—a key node in the object recognition pathway—is modulated by the extent to which visual artworks are liked or found beautiful. However, the available evidence is only correlational. Here we used transcranial magnetic stimulation (TMS) to investigate the putative causal role of LO in the aesthetic appreciation of paintings. In our first experiment, we found that interfering with LO activity during aesthetic appreciation selectively reduced evaluation of representational paintings, leaving appreciation of abstract paintings unaffected. A second experiment demonstrated that, although the perceived clearness of the images overall positively correlated with liking, the detrimental effect of LO TMS on aesthetic appreciation does not owe to TMS reducing perceived clearness. Taken together, our findings suggest that object-recognition mechanisms mediated by LO play a causal role in aesthetic appreciation of representational art.
Resumo:
Since creation of the European Communities the number of Member States has gradually increased from the original six to current twenty-eight. Enlargement has become an EU’s flagship external policy, demonstrating the EU’s ability to shape its neighbourhood and to serve as a catalyst of deep and multilayered reforms. The consecutive seven enlargement rounds went in parallel with widespread internal developments, culminating with the creation of the European Union and, most recently, entry into force of the Treaty of Lisbon. As this volume demonstrates, EU criminal law has evolved considerably from its early days under the legal framework laid down by the Treaty of Maastricht to its current post-Lisbon shape. On 1 December 2014, that is with expiry of a five year transitional regime for the jurisdiction of the Court of Justice, Police and Judicial Co-operation in Criminal Matters became a fully fledged EU policy, governed largely by the same modus operandi as other areas of EU competence and with compulsory jurisdiction of the Court of Justice. As EU criminal law developed internally, so did its external dimension, including the role it plays in the enlargement policy. In case of the latter the expiry of the same transitional period has brought to an end a rather anomalous situation whereby the European Union had more enforcement tools before and after accession vis-à-vis its future/new Member States than it could employ against the old ones. This bifurcation, quite rightly, triggered a lot of discussions about double standards used by the European Union in its pre-accession policy. This is exacerbated by the fact that some of those standards are neither defined in EU law, nor pursued vis-à-vis the existing EU’s Member States. The aim of this chapter is to demonstrate that evolution with particular emphasis on the role of EU Criminal Law in the policy currently employed by the European Union vis-à-vis candidate and potential candidate countries of the Western Balkans and to Turkey. Arguably, together with political conditionality, it has become one of the pillars of the enlargement process and, as the examples of accession negotiations with Montenegro and Serbia prove, its role is likely to increase as rapprochement of other candidates and potential candidates progresses to the next stages.
Resumo:
The aim of this study is to give an interpretation of the urban transformations connected to rail transit system investments; in particular the main research goal is to analyze and give a methodological support for the urban transformation phenomena government in the rail transit stations areas. The article proposes an empirical studies comparative analysis and an application in the Naples urban area, in which a new rail transit network has been developed. In particular the socio-economic transit impacts on the urban system are measured and interpretated with the support of a GIS; therefore an application of the node-place interpretative model (Bertolini 1999) is proposed in order to support transit–land use planning processes in the stations areas.
Resumo:
Wireless sensor networks (WSNs) have attracted growing interest in the last decade as an infrastructure to support a diversity of ubiquitous computing and cyber-physical systems. However, most research work has focused on protocols or on specific applications. As a result, there remains a clear lack of effective, feasible and usable system architectures that address both functional and non-functional requirements in an integrated fashion. In this paper, we outline the EMMON system architecture for large-scale, dense, real-time embedded monitoring. EMMON provides a hierarchical communication architecture together with integrated middleware and command and control software. It has been designed to use standard commercially-available technologies, while maintaining as much flexibility as possible to meet specific applications requirements. The EMMON architecture has been validated through extensive simulation and experimental evaluation, including a 300+ node test-bed, which is, to the best of our knowledge, the largest single-site WSN test-bed in Europe to date.
Resumo:
Wireless sensor networks (WSNs) emerge as underlying infrastructures for new classes of large-scale networked embedded systems. However, WSNs system designers must fulfill the quality-of-service (QoS) requirements imposed by the applications (and users). Very harsh and dynamic physical environments and extremely limited energy/computing/memory/communication node resources are major obstacles for satisfying QoS metrics such as reliability, timeliness, and system lifetime. The limited communication range of WSN nodes, link asymmetry, and the characteristics of the physical environment lead to a major source of QoS degradation in WSNs-the ldquohidden node problem.rdquo In wireless contention-based medium access control (MAC) protocols, when two nodes that are not visible to each other transmit to a third node that is visible to the former, there will be a collision-called hidden-node or blind collision. This problem greatly impacts network throughput, energy-efficiency and message transfer delays, and the problem dramatically increases with the number of nodes. This paper proposes H-NAMe, a very simple yet extremely efficient hidden-node avoidance mechanism for WSNs. H-NAMe relies on a grouping strategy that splits each cluster of a WSN into disjoint groups of non-hidden nodes that scales to multiple clusters via a cluster grouping strategy that guarantees no interference between overlapping clusters. Importantly, H-NAMe is instantiated in IEEE 802.15.4/ZigBee, which currently are the most widespread communication technologies for WSNs, with only minor add-ons and ensuring backward compatibility with their protocols standards. H-NAMe was implemented and exhaustively tested using an experimental test-bed based on ldquooff-the-shelfrdquo technology, showing that it increases network throughput and transmission success probability up to twice the values obtained without H-NAMe. H-NAMe effectiveness was also demonstrated in a target tracking application with mobile robots - over a WSN deployment.
Resumo:
Consider a wireless sensor network (WSN) where a broadcast from a sensor node does not reach all sensor nodes in the network; such networks are often called multihop networks. Sensor nodes take sensor readings but individual sensor readings are not very important. It is important however to compute aggregated quantities of these sensor readings. The minimum and maximum of all sensor readings at an instant are often interesting because they indicate abnormal behavior, for example if the maximum temperature is very high then it may be that a fire has broken out. We propose an algorithm for computing the min or max of sensor reading in a multihop network. This algorithm has the particularly interesting property of having a time complexity that does not depend on the number of sensor nodes; only the network diameter and the range of the value domain of sensor readings matter.